An Examination of Global Municipal Government Privacy and Security Policies

Author(s):  
Aroon Manoharan ◽  
Marc Fudge

This chapter highlights the research findings of a longitudinal study of online privacy and security practices among global municipalities conducted in 2005 and 2007. As cities worldwide implement sophisticated e-government platforms to increasingly provide services online, many barriers still inhibit the adoption of such strategies by the citizen users, and one such factor is the availability of a comprehensive privacy policy. The survey examines cities throughout the world based upon their population size, the total number of individuals using the Internet, and the percentage of individuals using the Internet. Specifically, we examined if the website has a privacy or security policy, does the website utilize digital signatures and if the website has a policy addressing the use of cookies to track users. Overall, results indicate that cities are increasingly emphasizing on privacy and security policies with major improvements in 2007, along with significant changes in the top ranking cities in when compared to the 2005 study.

Online based purchasing is the way toward buying products and enterprises from traders who sell them online through Internet. Since the rise of the World Wide Web, sellers have tried to offer their items to individuals who browser the Internet. Customers can visit online stores from their homes and shop comfortably. Presently a day shopping has turned out to be mainstream among individuals through browsing which has increased their web knowledge and effective utilization of internet. So internet shopping has become accustomed to the buyers which made the researcher to study the perception on internet based shopping. The principle aim of the this research is to find out the opinion of the respondents towards internet shopping. These days, there has been a flood in web based shopping. The Internet has been utilized by clothing organizations to sell their items and advance their brands. As an ever increasing number of individuals purchase attire on the web, there have been an expanding number of inquires about.


Author(s):  
Xiaoni Zhang ◽  
Margaret Myers

Computers and the Internet are now pervasive and essential parts of our lives: we use them at work and at home to gather information, for entertainment, and, increasingly, to do business. The Internet allows people to chat with others from all over the world, to follow the news from every continent, and conveniently to shop online at home or at the office. This book chapter covers two important and related concepts: Web design and e-commerce. The section on Web design starts with the overall picture of the Internet, history, Web authoring tools, design rules as well as introducing some research findings on Web design. E-commerce is introduced with definitions, technological acceptance model, online payment methods, online marketing and future developments.


2015 ◽  
pp. 994-1017
Author(s):  
Ioanna Dionysiou ◽  
Angelika Kokkinaki ◽  
Skevi Magirou ◽  
Theodosios Iacovou

This chapter presents the findings of an investigation on current security practices in Cypriot organizations, including enterprises and public sector divisions. In order to gain knowledge on the deployed security technologies by organizations, a survey was conducted and concluded in late 2010. The survey primarily examined compliance of enterprise current security policies and procedures with ISO 27001 security guidelines. A research analysis has been performed and identified that security mechanisms and the management of information technology (IT) resources may be improved on a number of aspects. Based on the research findings, an assessment of the viability of ISO 27001 in Cyprus is given as well as recommendations on the further deployment of ISO 27001.


2014 ◽  
Vol 10 (2) ◽  
pp. 62-78 ◽  
Author(s):  
Tonia San Nicolas-Rocca ◽  
Benjamin Schooley ◽  
Janine L. Spears

Institutions of higher education capture, store and disseminate information that is protected by state and federal regulations. As a result, IS security policies are developed and implemented to ensure end user compliance. This case study investigates end user knowledge of their university's IS security policy and proposes a new approach to improve end user compliance. The results of this study suggest that users may be contributors to the transfer of IS security policies when provided with an opportunity to participate in the development of an IS security awareness and training program.


2011 ◽  
pp. 271-285
Author(s):  
Xiaoni Zhang ◽  
Margaret Myers

Computers and the Internet are now pervasive and essential parts of our lives: we use them at work and at home to gather information, for entertainment, and, increasingly, to do business. The Internet allows people to chat with others from all over the world, to follow the news from every continent, and conveniently to shop online at home or at the office. This book chapter covers two important and related concepts: Web design and e-commerce. The section on Web design starts with the overall picture of the Internet, history, Web authoring tools, design rules as well as introducing some research findings on Web design. E-commerce is introduced with definitions, technological acceptance model, online payment methods, online marketing and future developments.


2015 ◽  
pp. 890-901
Author(s):  
Adeyinka Tella ◽  
A. K. Afolabi

The policy issues posed by the Internet in different countries around the world do not seem to be very different. The Internet itself helps us realize this by allowing governments and citizens everywhere to share their problems and solutions. How different governments react to the Internet depends on the extent to which they are prepared to accept external influences. The continued growth of the Internet for personal, government, and business purposes is now being affected by a number of policy issues. The discussions in this chapter center on these various Internet policy issues. These are the issues of content on the Internet, equal access, copyright, and protection of intellectual property. The chapter also considers the emerging Internet policy issues such as privacy and security, and explores the basic principles for managing intellectual property in the digital environment and then suggests the tools for managing intellectual property by digital libraries.


2020 ◽  
Vol 28 (3) ◽  
pp. 467-483 ◽  
Author(s):  
Moufida Sadok ◽  
Steven Alter ◽  
Peter Bednar

Purpose This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work system theory (WST) to frame the results, thereby illustrating why the mere existence of corporate security policies or general security training often is insufficient for establishing and maintaining information security. Design/methodology/approach This research was designed to produce a better appreciation and understanding of potential issues or gaps in security practices in SMEs. The research team interviewed 187 employees of 39 SMEs in the UK. All of those employees had access to sensitive information. Gathering information through interviews (instead of formal security documentation) made it possible to assess security practices from employees’ point of view. Findings Corporate policies that highlight information security are often disconnected from actual work practices and routines and often do not receive high priority in everyday work practices. A vast majority of the interviewed employees are not involved in risk assessment or in the development of security practices. Security practices remain an illusory activity in their real-world contexts. Research limitations/implications This paper focuses only on closed-ended questions related to the following topics: awareness of existing security policy; information security practices and management and information security involvement. Practical implications The empirical findings show that corporate information security policies in SMEs often are insufficient for maintaining security unless those policies are integrated with visible and recognized work practices in work systems that use or produce sensitive information. The interpretation based on WST provides guidelines for enhancing information system security. Originality/value Beyond merely reporting empirical results, this research uses WST to interpret the results in a way that has direct implications for practitioners and for researchers.


2022 ◽  
Vol 10 (4) ◽  
pp. 192-205
Author(s):  
Reben Mohammed Saleem Kurda ◽  
Umran Abdullah Haje ◽  
Muhamad Hussein Abdulla ◽  
Zhwan Mohammed Khalid

In our everyday lives, the IoT is everywhere. They are used for the monitoring and documentation of environmental improvements, fire safety and even other useful roles in our homes, hospitals and the outdoors. IoT-enabled devices that are linked to the internet transmit and receive a large amount of essential data over the network. This provides an opportunity for attackers to infiltrate IoT networks and obtain sensitive data. However, the risk of a loss of privacy and security could outweigh any of these benefits. Many tests have been carried out in order to solve these concerns and find a safer way to minimize or remove the effect of IoT technologies on privacy and security practices in order to protect them. The issue with IoT devices is that they have small output modules, making it impossible to adapt current protection methods to them. This constraint necessitates the presentation of lightweight algorithms that enable IoT devices. In this article, investigated the context and identify different safety, protection, and approaches for securing components of IoT-based ecosystems and systems, as well as evolving security solutions. In addition, several proposed algorithms and authentication methods in IoT were discussed in order to avoid various types of attacks while keeping the limitations of the IoT framework in mind. Also discuss some hardware security in IoT devices.


2013 ◽  
Vol 3 (4) ◽  
pp. 22-31
Author(s):  
Ilona Ilvonen ◽  
Pasi Virtanen

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.


2016 ◽  
Vol 33 (2) ◽  
pp. 15-16
Author(s):  
Adetoun A. Oyelude

Purpose This is the first edition of the column for 2016. Design/methodology/approach The vignettes from the Internet this year will be mainly from blogs. Findings This edition covers issues germane mainly to libraries, technology use and maintenance of digital devices used. Research limitations/implications Executives in the IT industry may be looking at three major issues in 2016. Practical implications More often than not, internal vulnerabilities exceed external security threats. Social implications Businesses must define and set the standards of what good and bad security practices look like. Originality/value IT teams should restrict the extent that outside devices can connect and roam around on proprietary corporate networks and also work to ensure that employees are educated on the company’s security policy.


Sign in / Sign up

Export Citation Format

Share Document